NSAµÈ»ú¹¹ÁªºÏÐû²¼ÈçºÎÅäÖúͼà¿ØPowerShellµÄÖ¸ÄÏ

Ðû²¼Ê±¼ä 2022-06-24
1¡¢NSAµÈ»ú¹¹ÁªºÏÐû²¼ÈçºÎÅäÖúͼà¿ØPowerShellµÄÖ¸ÄÏ


6ÔÂ22ÈÕ£¬ÃÀ¹úCISA¡¢ÐÂÎ÷À¼NZ NCSCºÍÓ¢¹úNCSC-UKÐû²¼ÁËÒ»·ÝÁªºÏÍøÂçÄþ¾²ÐÅÏ¢±í(CIS)¡£ÕâЩ»ú¹¹½¨ÒéÊʵ±µÄÅäÖúͼà¿ØPowerShell£¬¶ø²»ÊÇÒòΪ¹¥»÷Õß»áÔÚ·ÃÎÊÍøÂçºóʹÓÃËü¶øÍêȫɾ³ý»ò½ûÓÃËü¡£Ö¸ÄϽ¨Ò飬ÀûÓÿò¼ÜÖеĹ¦Ð§£¬ÀýÈçPowerShellÔ¶³Ì´¦Öà £»¶ÔÓÚÔ¶³ÌÁ¬½Ó£¬Ê¹ÓÃPowerShell 7ÖÐÖ§³ÖµÄSSH£¬ÒÔÔö¼Ó¹«Ô¿Éí·ÝÑéÖ¤µÄ±ãÀûÐÔºÍÄþ¾²ÐÔ £»ÔÚAppLocker»òWindows DefenderÓ¦Ó÷¨Ê½¿ØÖÆ(WDAC)µÄ×ÊÖúϼõÉÙPowerShellµÄ²Ù×÷£¬½«¹¤¾ßÉèÖÃΪÊÜÏÞÓïÑÔģʽ(CLM)£¬´Ó¶ø¾Ü¾ø¹ÜÀíÔ±½ç˵µÄ¼Æı֮ÍâµÄ²Ù×÷¡£ 


https://www.cisa.gov/uscert/ncas/current-activity/2022/06/22/keeping-powershell-measures-use-and-embrace


2¡¢Cyber Spetsnaz½«Ã¬Í·Ãé×¼Á¢ÌÕÍðµÄÒªº¦»ù´¡ÉèÊ©


¾ÝýÌå6ÔÂ22ÈÕ±¨µÀ£¬Cyber Spetsnaz¿ªÊ¼Õë¶ÔÁ¢ÌÕÍðµÄÕþ¸®»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©¡£ÔÚÁ¢ÌÕÍðÐû²¼¶Ô¶íÂÞ˹ʵʩ¡°½ûÔËÁºó£¬¸ÃÍÅ»ïÐû²¼ÁËЭµ÷DDoS¹¥»÷µÄ¶à¸öÄ¿±ê£¬ÆäÖÐÉæ¼°ÎïÁ÷¹«Ë¾¡¢½»Í¨»ù´¡ÉèÊ©¡¢Ö÷Òª½ðÈÚ»ú¹¹¡¢ISP¡¢»ú³¡¡¢ÄÜÔ´¹«Ë¾¡¢Ö÷ҪýÌåºÍÕþ¸®µÄÍøÕ¾¡£¾Ý6ÔÂ23ÈÕ±¨µÀ£¬Á¢ÌÕÍð¹ú¼ÒÍøÂçÄþ¾²ÖÐÐÄ(NKSC)Ðû²¼ÁËÒ»Ôòͨ¸æ£¬³ÆÕë¶Ô¸Ã¹úÕþ¸®µÄDDoS¹¥»÷¼±¾çÔö¼Ó£¬µ¼ÖÂÁ¢ÌÕÍðµÄÔËÊ乫˾¡¢½ðÈÚ»ú¹¹ºÍÆäËü´óÐÍʵÌ嶼·¢ÉúÁ˶ÌÔݵķþÎñÖжÏ¡£


https://securityaffairs.co/wordpress/132518/hacktivism/lithuania-under-cyber-attack.html


3¡¢Check PointÅû¶Tropic Trooper½üÆÚ¹¥»÷µÄÏêÇé


Check PointÔÚ6ÔÂ22ÈÕÐû²¼Á˹ØÓÚTropic Trooper¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£´Ë´Î»î¶¯Ê¹ÓÃÁËеļÓÔØ·¨Ê½NimbdaºÍľÂíYahoyahµÄбäÖÖ¡£Ñ¬È¾Á´Ê¼ÓÚ¶ñÒâ°æ±¾µÄSMS Bomber£¬Ëüʵ¼ÊÉÏÊÇNimbda¼ÓÔØ·¨Ê½£¬µ«Ê¹ÓÃÁËSMS Bomberͼ±ê£¬²¢°üÂÞSMS Bomber×÷ΪǶÈëµÄ¿ÉÖ´ÐÐÎļþ£¬¼ÓÔغó»á°²×°Yahoyah±äÌå²¢ÊÕ¼¯Ö÷»úµÄÊý¾Ý¡£×îÖÕµÄpayloadÓÉYahoyahÏÂÔØ£¬²¢Ê¹ÓÃÒþд¼¼Êõ±àÂëΪJPGͼÏñ£¬Check Point½«Æäʶ±ðΪTClient£¬ÊÇTropic TrooperÔÚ¹ýÈ¥»î¶¯ÖÐÔøʹÓùýµÄºóÃÅ¡£´ËÍ⣬ÓÃÓÚ°ü×°YahoyahµÄ¼ÓÃÜÊÇAESµÄ×Ô½ç˵ʵÏÖ£¬ËüÖ´ÐÐÁËÁ½´Îµ¹ÐòµÄÂÖ²Ù×÷£¬Ê¹ÑùÌìÖ°Îö±äµÃ·Ç³£À§ÄÑ¡£


https://research.checkpoint.com/2022/chinese-actor-takes-aim-armed-with-nim-language-and-bizarro-aes/


4¡¢QNAPÐÞ¸´ÒÑ´æÔÚÈýÄêµÄPHP©¶´CVE-2019-11043


6ÔÂ22ÈÕ£¬QNAPÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËÒ»¸öÒÑ´æÔÚÈýÄêÖ®¾ÃµÄPHP©¶´£¨CVE-2019-11043£©¡£QNAPÔÚͨ¸æÖнâÊÍ£¬Â©¶´»áÓ°ÏìµÍÓÚ7.1.33µÄPHP°æ±¾7.1.x¡¢µÍÓÚ7.2.24µÄ7.2.xºÍµÍÓÚ7.3.11µÄ7.3.x£¬Èç¹û±»ÀûÓ㬿ɵ¼ÖÂÔ¶³ÌÖ´ÐдúÂë¡£¸Ã©¶´CVSSÆÀ·ÖΪ9.8£¬Ó°ÏìÁËQNAPµÄ¶à¸ö°æ±¾µÄQTS¡¢QuTS heroºÍQuTScloudÉ豸¡£¸Ã¹«Ë¾½¨ÒéÓû§Á¢¼´¸üе½×îеİ汾£¬ÒÔÐÞ¸´´Ë©¶´¡£


https://www.bleepingcomputer.com/news/security/critical-php-flaw-exposes-qnap-nas-devices-to-rce-attacks/


5¡¢ProofpointÐû²¼2022ÄêÉç»á¹¤³ÌµÄ¹¥»÷»î¶¯³ÂËß


ProofpointÔÚ6ÔÂ22ÈÕÐû²¼ÁË×îеÄÉç»á¹¤³Ìѧ³ÂËß¡£³ÂËß·ÖÎöÁËÉç»á¹¤³ÌµÄÖ÷ÒªÇ÷ÊƺÍÐÐΪ£¬°üÂÞ£¬¹¥»÷Õß¿ÉÒÔͨ¹ýÑÓ³¤¶Ô»°ÓëÄ¿±ê½¨Á¢ÐÅÈΡ¢À©´óÁ˶ÔÓÐЧ¼ÆıµÄÀÄÓã¨ÈçʹÓÃÊÜÐÅÈι«Ë¾µÄ·þÎñ£©¡¢ÔÚÆä¹¥»÷Á´ÖÐÀûÓÃÕý½»¼¼Êõ£¨Èçµç»°£©¡¢ÖªµÀ²¢ÀûÓÃͬÊÂÖ®¼äÏÖÓеĶԻ°¡¢ÀûÓÃÈÈÃźÍÓëÉç»áÏà¹ØµÄÖ÷ÌâµÈ¡£´ËÍ⣬¸Ã³ÂËß»¹×ÅÑÛÓÚ¾­³£±»ÀÄÓõķþÎñ£¬ºÃ±È¹È¸èDriveºÍDiscord¡£


https://www.proofpoint.com/us/blog/threat-insight/how-threat-actors-hijack-attention-2022-social-engineering-report


6¡¢ÈÕ±¾Æû³µÁã¼þÖÆÔìÉÌNichirin³ÆÆäÔâµ½ÀÕË÷¹¥»÷

      

¾Ý6ÔÂ23ÈÕ±¨µÀ£¬ÈÕ±¾Æû³µºÍĦÍгµÈí¹ÜÖÆÔìÉÌNichirinµÄ×Ó¹«Ë¾Nichirin-Flex USAÔâµ½ÁËÀÕË÷¹¥»÷£¬µ¼Ö¸ù«Ë¾µÄÍøÂçÖжÏ¡£¹¥»÷·¢ÉúÔÚ6ÔÂ14ÈÕ£¬¸Ã¹«Ë¾ÔÚ¼ì²âµ½ÆäÍøÂçÉÏδ¾­ÊÚȨµÄ·ÃÎʺóÁ¢¼´½«²Ù×÷Çл»µÃÊÖ¶¯Ä£Ê½¡£ÓÉÓÚÍøÂç¹¥»÷Ò²Ó°ÏìÁ˲úÎï·ÖÏú£¬¶øÇÒ¶©µ¥ÊÇÊÖ¶¯Íê³ÉµÄ£¬Òò´Ë¿Í»§µÄ¶©µ¥Ó¦¸Ã»áÑÓ³Ù¡£¸Ã¹«Ë¾µÄÉùÃ÷ÌåÏÖ£¬»Ö¸´ÏµÍ³ÒѳÉΪ»Ö¸´ÒµÎñÔËÓªµÄÓÅÏÈÊÂÏÆäÄ¿Ç°ÕýÔÚÊÓ²ìδ¾­ÊÚȨµÄ·ÃÎÊÊÇÈçºÎ·¢ÉúµÄ£¬²¢ÊÔͼȷ¶¨ÐÅϢ鶵ÄÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/automotive-hose-maker-nichirin-hit-by-ransomware-attack/